You are on page 1of 7

(Wireless & Mobile Computing)

Assignment-I
1. The company has a Class B IP address range of 172.16.0.0/16. If they decide to use
subnetting for each VLAN, and each subnet can accommodate a maximum of 30 hosts,
calculate the number of subnets created.
Given:

 Class B IP address range: 172.16.0.0/16

 Each subnet can accommodate a maximum of 30 hosts

To calculate the number of subnets, we first need to determine how many bits are required for
host addressing within each subnet. Since we need to accommodate a maximum of 30 hosts per
subnet, we need at least 5 host bits (2^5 - 2 = 30, subtracting 2 for network and broadcast
addresses).
Now, we subtract the number of host bits from the total number of bits in the subnet mask: 16
(total bits) - 5 (host bits) = 11 subnet bits
Using these 11 subnet bits, we calculate the number of subnets using the formula 2^n, where n is
the number of subnet bits.
Number of subnets = 2^11 = 2048
So, the correct answer is indeed 2048 subnets within the Class B IP address range 172.16.0.0/16,
each accommodating a maximum of 30 hosts per subnet.

OR

To calculate the number of subnets created, we first need to determine the subnet size that can
accommodate 30 hosts.

In binary, 30 is represented as 11110. However, we need to account for the network address and
broadcast address, which are not available for hosts. So, we need a subnet size that can
accommodate at least 32 addresses (30 hosts + 2 for network and broadcast).

In binary, 32 is 100000, which requires 5 bits. Therefore, we need to reserve 5 bits for host
addresses in each subnet.

Since an IPv4 address is 32 bits long, and we’re starting with a /16 prefix (for the Class B IP
address range), we have 16 bits remaining for subnetting. If we reserve 5 bits for hosts, we have
11 bits left for subnets.

So, the number of subnets created would be 2^11 = 2048.

Therefore, the company can create 2048 subnets with their Class B IP address range of
172.16.0.0/16, where each subnet can accommodate a maximum of 30 hosts.

2. For one of the VLANs, the company decides to use CIDR (Classless Inter-Domain
Routing) notation to represent the subnet. If this VLAN requires at least 120 hosts,
determine the appropriate CIDR notation for this subnet.
To determine the appropriate CIDR notation for a subnet that requires at least 120 hosts, we first
need to find out how many host bits are required to accommodate 120 hosts.
Since we need to accommodate at least 120 hosts, we need at least 7 host bits (2^7 - 2 = 126,
subtracting 2 for network and broadcast addresses).
Now, we need to find the smallest CIDR subnet that can accommodate at least 120 hosts
Given that we need to accommodate at least 120 hosts, we previously determined that we need at
least 7 host bits.
Starting with the Class B network 172.16.0.0/16, which has 16 bits for the network portion and
16 bits for the host portion, we need to borrow additional bits from the host portion to create
subnets with enough host addresses.
To accommodate at least 120 hosts, we could use a subnet with a /25 CIDR notation, which
would provide 7 host bits (32 - 25 = 7) and 2^7 - 2 = 126 usable host addresses (subtracting 2 for
the network and broadcast addresses).
So, the appropriate CIDR notation for the VLAN subnet requiring at least 120 hosts would be:
172.16.0.0/25

3. The company is planning to integrate IPv6 into its network. If the IPv6 address format is
used, and assuming a single VLAN requires 10,000 unique addresses, calculate the size of
the IPv6 address space needed for this VLAN.

4. Explain the concept of intranet and internet. compare their functionalities and discuss
their significance in modern business environments.
Intranet:

 An intranet is a private network that is accessible only to an organization's staff.

 It uses Internet protocols and technologies for sharing information and resources within
an organization.
 Intranets typically include internal websites, file-sharing systems, email systems, and
other collaborative tools.

 Access to an intranet is restricted to authorized users within the organization, often


requiring authentication.

 Intranets facilitate communication, collaboration, and information sharing among


employees, departments, and branches of an organization.

 They provide a secure environment for internal communication and data sharing,
protecting sensitive information from external threats.

 Intranets are used for various purposes such as document management, employee
directories, project management, internal news, and policies dissemination.

Internet:

 The internet is a global network of interconnected computers and devices that use
standardized communication protocols to exchange data.

 It enables communication and information exchange between individuals, organizations,


and entities worldwide.

 The internet facilitates access to a vast array of resources and services, including
websites, email, social media, online banking, e-commerce, and cloud computing.

 Access to the internet is public and unrestricted, allowing anyone with an internet
connection to access information and services available on the World Wide Web.

 The internet provides a platform for global communication, collaboration, commerce,


research, entertainment, and information dissemination.

 It plays a crucial role in connecting businesses with customers, suppliers, partners, and
markets worldwide, enabling global trade and economic activities.

 The internet serves as a platform for innovation, enabling the development of new
technologies, digital services, and business models.

Comparison:

1. Access: Intranets are private networks accessible only to authorized users within an
organization, while the internet is a public network accessible to anyone with an internet
connection.

2. Scope: Intranets are limited to the internal operations of an organization, facilitating


communication and collaboration among employees, while the internet spans the globe,
connecting users worldwide.

3. Security: Intranets are typically more secure than the internet since access is restricted to
authorized users, and additional security measures can be implemented to protect
sensitive information. The internet, on the other hand, is subject to various security
threats and risks, such as malware, phishing, and data breaches.
4. Purpose: Intranets are primarily used for internal communication, collaboration, and
information sharing within an organization, while the internet serves a broader range of
purposes, including communication, research, entertainment, commerce, and social
interaction.

Significance in Modern Business Environments:

 Intranets: Intranets play a crucial role in modern business environments by facilitating


internal communication, collaboration, and knowledge sharing among employees. They
improve productivity, efficiency, and teamwork by providing centralized access to
information, documents, and resources. Intranets also support remote work and virtual
collaboration, enabling employees to work together from different locations.
Additionally, intranets enhance organizational culture, transparency, and employee
engagement by providing platforms for sharing news, updates, and feedback.

 Internet: The internet is essential for modern businesses to connect with customers,
suppliers, partners, and markets worldwide. It enables businesses to reach a global
audience, promote their products and services, and conduct e-commerce transactions. The
internet facilitates online marketing, advertising, and customer engagement through
websites, social media, and digital platforms. Businesses leverage the internet for market
research, competitive analysis, and trend monitoring to inform strategic decision-making.
Moreover, the internet enables businesses to access cloud-based services, software
applications, and digital tools for various operations, such as accounting, customer
relationship management (CRM), and project management.

S.N
O Internet Intranet

Internet is used to connect different networks


1. Intranet is owned by private firms.
of computers simultaneously.

2. On the internet, there are multiple users. On an intranet, there are limited users.

3. Internet is unsafe. Intranet is safe.

On the internet, there is more number of In the intranet, there is less number of
4.
visitors. visitors.

5. Internet is a public network. Intranet is a private network.

6. Anyone can access the Internet. In this, anyone can’t access the Intranet.

7. The Internet provides unlimited information. Intranet provides limited information.

8. Using Social media on your phone or A company used to communicate


researching resources via Google. internally with its employees and share
S.N
O Internet Intranet

information

The Internet is a global network that An intranet is a private network that


9. connects millions of devices and computers connects devices and computers within
worldwide. an organization.

It is open to everyone and allows access to


An intranet is only accessible to
10. public information, such as websites and
authorized users within the organization.
online services.

An intranet is primarily used for internal


It is used for communication, sharing of
communication, collaboration, and
11. information, e-commerce, education,
information sharing within an
entertainment, and other purposes.
organization.

Access to an intranet is restricted to


Users can access the Internet from any
authorized users within the organization
12. location with an Internet connection and a
and is typically limited to specific
compatible device.
devices and locations.

Security measures, such as firewalls, Intranets employ similar security


encryption, and secure sockets layer (SSL) measures to protect against unauthorized
13.
protocols, are used to protect against threats access and ensure the privacy and
like hacking, viruses, and malware. integrity of shared data.

The Internet is a public network that is not Intranets are private networks that are
14. owned by any particular organization or owned and managed by the organization
group. that uses them.

Examples of intranet-based services


Examples of Internet-based services include
include internal communications,
15. email, social media, search engines, and
knowledge management systems, and
online shopping sites.
collaboration tools

5. Describe the structure of an IP Datagram including its various fields. how does the IP
datagram format facilitates data delivery in a network?

Assignment-II

1. Consider a network where RIP (Routing Information Protocol) is used. If a router has a
metric of 16 for a route, what does this metric value signify in RIP.
2. In OSPF (Open Shortest Path First), explain the concept of area types and how they
contribute to network design.

3.A TCP connection has a window size of 500 bytes. After successfully receiving
acknowledgment for the first 200 bytes, calculate the new window size if the receiver
advertises a window size of 300.

4. Differentiate between an exterior gateway protocol and an interior gateway protocol.

5. Explain the concept of sockets and their use in TCP communication.

Assignment-III

1. Consider an IEEE 802.11 WLAN operating in the 2.4 GHz band with a data rate of 54
Mbps. Calculate the time required to transmit a 1500-byte frame under the assumption of
no interference or collisions.

2. A mobile node initiates a registration process with a foreign agent. If the registration
process involves a total of 500 bytes of control information, calculate the total data
transmitted over the network if the mobile node uses a tunneling technique during
registration.

3. Explain the concept of "Hidden Terminals" in wireless communication. Consider a


WLAN scenario with three terminals (A, B, C), where A is hidden from C. If terminal B
wants to send a message to terminal C, describe the potential issues and solutions.

4. Classified different types of adhoc routing protocols provide example of


protocols such as OADV, DSDV, DSR,ZRP and discuss their characteristics.

5. Provide an overview of IEEE 802 .11 system architecture including the protocol
architecture and Physical layer.

Assignment-IV
1.If a mobile device using M-TCP establishes a connection with a server and the Round-
Trip Time (RTT) between them is 150 milliseconds, calculate the initial value of the
timeout for the retransmission timer using the Karn/Partridge algorithm (assuming no
retransmissions have occurred yet).

2. A GSM network has a cell with a radius of 1 kilometer. If the network uses Frequency
Division Multiple Access (FDMA) with 200 kHz bandwidth per channel, calculate the total
number of channels available for this cell.

3. Provide real world examples for scenarios where the use of I-TCP ,S-TCP or M-TCP
would be particularly advantageous.

4. Provide insight into the handover process in cellular networks discuss the challenges and
strategies associated with seamless handovers.
5. Compare cellular networks with WLANs . highlight the key differences in terms of
coverage capacity and deployment scenarios.

You might also like